Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2951
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSelvaraj, R.S.-
dc.contributor.authorDemamu, J.-
dc.date.accessioned2025-01-24T11:17:04Z-
dc.date.available2025-01-24T11:17:04Z-
dc.date.issued2011-10-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2951-
dc.descriptionNITWen_US
dc.description.abstractAmong the different applications where data hiding techniques can be used, one that has received huge attention in the recent years is steganography. With Matrix Embedding based on Hamming Codes which was first introduced by Crandall, coding theory has entered the field of steganography. In this paper, we investigate the application of q-ary codes with rank metric to steganography by using matrix embedding technique. We propose rank metric codes for steganographic security, as the nature of rank involves linear dependency or independency of symbols in the coordinates, which is more complex than merely comparing positions of bits. A method of constructing stego-codes using subcodes of linear codes is proposed. Some bounds, including the one for embedding efficiency, are also determined.en_US
dc.language.isoenen_US
dc.publisher2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)en_US
dc.subjectRank metricen_US
dc.subjectCovering radiusen_US
dc.titleSteganographic protocols based on rank metric codesen_US
dc.typeOtheren_US
Appears in Collections:Mathematics

Files in This Item:
File Description SizeFormat 
Steganographic_protocols_based_on_rank_metric_codes.pdf254.18 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.